Today > 6 Critical | 21 High | 51 Medium vulnerabilities   -   You can now download lists of IOCs here!

Botnets Continue to Target Aging D-Link Vulnerabilities

Dec. 31, 2024, 4:58 p.m.

Description

Two botnets, FICORA and CAPSAICIN, have been exploiting long-standing vulnerabilities in D-Link routers to spread globally. FICORA, a Mirai variant, uses a shell script to download and execute malware on various Linux architectures, incorporating DDoS attack functions. CAPSAICIN, likely based on the Keksec group's botnets, also targets multiple Linux architectures and includes DDoS capabilities. Both botnets exploit weaknesses in the HNAP interface of affected D-Link devices, demonstrating the persistent threat posed by unpatched vulnerabilities. The attackers use servers in the Netherlands and target countries worldwide, with CAPSAICIN focusing on East Asian countries. Regular device updates and comprehensive monitoring are crucial for mitigating these threats.

Date

Published: Dec. 31, 2024, 4:26 p.m.

Created: Dec. 31, 2024, 4:26 p.m.

Modified: Dec. 31, 2024, 4:58 p.m.

Indicators

faeea9d5091384195e87caae9dd88010c9a2b3b2c88ae9cac8d79fd94f250e9f

f71dc58cc969e79cb0fdfe5163fbb9ed4fee5e13cc9407a11d231601ee4c6e23

ec87dc841af77ec2987f3e8ae316143218e9557e281ca13fb954536aa9f9caf1

ec508df7cb142a639b0c33f710d5e49c29a5a578521b6306bee28012aadde4a8

ea83411bd7b6e5a7364f7b8b9018f0f17f7084aeb58a47736dd80c99cfeac7f1

df176fb8cfbc7512c77673f862e73833641ebb0d43213492c168f99302dcd5e3

d6a2a22000d68d79caeae482d8cf092c2d84d55dccee05e179a961c72f77b1ba

ca3f6dce945ccad5a50ea01262b2d42171f893632fc5c5b8ce4499990e978e5b

c7be8d1b8948e1cb095d46376ced64367718ed2d9270c2fc99c7052a9d1ffed7

b74dbd02b7ebb51700f3c5900283e46570fe497f9b415d25a029623118073519

bde6ef047e0880ac7ef02e56eb87d5bc39116e98ef97a5b1960e9a55cea5082b

b699cd64b9895cdcc325d7dd96c9eca623d3ec0247d20f39323547132c8fa63b

b3ad8409d82500e790e6599337abe4d6edf5bd4c6737f8357d19edd82c88b064

afee245b6f999f6b9d0dd997436df5f2abfb3c8d2a8811ff57e3c21637207d62

ac2df391ede03df27bcf238077d2dddcde24cd86f16202c5c51ecd31b7596a68

aaa49b7b4f1e71623c42bc77bb7aa40534bcb7312da511b041799bf0e1a63ee7

a06fd0b8936f5b2370db5f7ec933d53bd8a1bf5042cdc5c052390d1ecc7c0e07

9b161a32d89f9b19d40cd4c21d436c1daf208b5d159ffe1df7ad5fd1a57610e5

7f6912de8bef9ced5b9018401452278570b4264bb1e935292575f2c3a0616ec4

8349ba17f028b6a17aaa09cd17f1107409611a0734e06e6047ccc33e8ff669b0

803abfe19cdc6c0c41acfeb210a2361cab96d5926b2c43e5eb3b589a6ed189ad

7b29053306f194ca75021952f97f894d8eae6d2e1d02939df37b62d3845bfdb7

7ab36a93f009058e60c8a45b900c1c7ae38c96005a43a39e45be9dc7af9d6da8

7a815d4ca3771de8a71cde2bdacf951bf48ea5854eb0a2af5db7d13ad51c44ab

784c9711eadceb7fedf022b7d7f00cff7a75d05c18ff726e257602e3a3ccccc1

764a03bf28f9eec50a1bd994308e977a64201fbe5d41337bdcc942c74861bcd3

6e3ef9404817e168c974000205b27723bc93abd7fbf0581c16bb5d2e1c5c6e4a

59704cf55b9fa439d6f7a36821a50178e9d73ddc5407ff340460c054d7defc54

540c00e6c0b53332128b605b0d5e0926db0560a541bb13448d094764844763df

48a04c7c33a787ef72f1a61aec9fad87d6bd9c49542f52af7e029ac83475f45d

464e2f1faab2a40db44f118f7c3d1f9b300297fe6ced83fabe87563fc82efe95

4600703535e35b464f0198a1fa95e3668a0c956ab68ce7b719c28031d69b86ff

32e66b87f47245a892b102b7141d3845540b270c278e221f502807758a4e5dee

1ca1d5a53c4379c3015c74af2b18c1d9285ac1a48d515f9b7827e4f900a61bde

18c92006951f93a77df14eca6430f32389080838d97c9e47364bf82f6c21a907

10d7aedc963ea77302b967aad100d7dd90d95abcdb099c5a0a2df309c52c32b8

148f6b990fc1f1903287cd5c20276664b332dd3ba8d58f2bf8c26334c93c3af5

1007f5613a91a5d4170f28e24bfa704c8a63d95a2b4d033ff2bff7e2fe3dcffe

87.11.174.141

103.149.87.69

87.10.220.221

192.110.247.46

194.110.247.46

45.86.86.60

www.codingdrunk.in

http://pirati.abuser.eu/yakuza.yak.sh

ru.coziest.lol

pirati.abuser.eu

f.codingdrunk.cc

le.codingdrunk.in

eighteen.pirate

Attack Patterns

CAPSAICIN

FICORA

T1571

T1059.004

T1095

T1573

T1071

T1595

T1046

T1498

T1190

CVE-2022-37056

CVE-2019-10891

CVE-2024-33112

CVE-2015-2051